CAD for Assurance of Electronic Systems
 

RTL Trojan Attacks

Description

Hardware Trojan attacks are a major security concern for integrated circuits (ICs) vendors. It entails the malicious modification of an IC during the design stage or the manufacturing stage. The attacker with access to the RTL code of the IC at the design house can insert a stealthy Trojan in the design code to evade detection during post-manufacturing testing. Such a Trojan can be activated during the operation of the chip through triggering mechanisms such as a counter, an input vector, or under certain physical conditions. Upon activation, the Trojan can leak sensitive information from the chip, modify functionality, or cause a denial-of-service of the underlying computing device. To detect such attacks tools such as Formal-PCH and QIF-RTL have been developed.

Related Tools

Publications

Facon, Adrien; Guilley, Sylvain; Lec'hvien, Matthieu; Marion, Damien; Perianin, Thomas

Binary Data Analysis for Source Code Leakage Assessment Proceedings Article

In: Innovative Security Solutions for Information Technology and Communications, pp. 391–409, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-12942-2.

Abstract | Links | BibTeX

Souissi, Youssef; Facon, Adrien; Guilley, Sylvain

Virtual Security Evaluation Proceedings Article

In: Carlet, Claude; Guilley, Sylvain; Nitaj, Abderrahmane; Souidi, El Mamoun (Ed.): Codes, Cryptology and Information Security, pp. 3–12, Springer International Publishing, Cham, 2019, ISBN: 978-3-030-16458-4.

Abstract | Links | BibTeX

Takarabt, Sofiane; Chibani, Kais; Facon, Adrien; Guilley, Sylvain; Mathieu, Yves; Sauvage, Laurent; Souissi, Youssef

Pre-silicon Embedded System Evaluation as New EDA Tool for Security Verification Proceedings Article

In: 2018 IEEE 3rd International Verification and Security Workshop (IVSW), pp. 74-79, 2018.

Abstract | Links | BibTeX

Guo, Xiaolong; Dutta, Raj Gautam; He, Jiaji; Jin, Yier

PCH framework for IP runtime security verification Proceedings Article

In: 2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp. 79-84, IEEE, 2017.

Abstract | Links | BibTeX

Guo, Xiaolong; Dutta, Raj Gautam; Mishra, Prabhat; Jin, Yier

Automatic Code Converter Enhanced PCH Framework for SoC Trust Verification Journal Article

In: IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 25, no. 12, pp. 3390-3400, 2017.

Abstract | Links | BibTeX

Guo, Xiaolong; Dutta, Raj Gautam; Mishra, Prabhat; Jin, Yier

Scalable SoC trust verification using integrated theorem proving and model checking Proceedings Article

In: 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 124-129, HOST IEEE, McLean, VA, USA , 2016.

Abstract | Links | BibTeX

Guo, Xiaolong; Dutta, Raj Gautam; Jin, Yier

Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems Journal Article

In: IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 2, pp. 405-417, 2016.

Abstract | Links | BibTeX